The Hacker News Logo
Subscribe to Newsletter

The Hacker News – Most Popular Cyber Security, Hacking News Site: IT security

Keeping the Bots at Bay: How to Detect Brute Force Attacks

Keeping the Bots at Bay: How to Detect Brute Force Attacks

November 20, 2014Swati Khandelwal
Thanks to recent events involving certain celebrities’ stolen pictures, “brute-force attack” is now one of the hot buzz words making its...
'The Hacker News' Celebrating its 4th Anniversary

'The Hacker News' Celebrating its 4th Anniversary

November 01, 2014Mohit Kumar
Dear THN Readers, ' The Hacker News ' is celebrating its 4th Anniversary today and we would like to thank every single Hacke...
Crowd-Sourced Threat Intelligence: AlienVault Open Threat Exchange™ (OTX)

Crowd-Sourced Threat Intelligence: AlienVault Open Threat Exchange™ (OTX)

July 14, 2014Swati Khandelwal
For years, the systems and networks that run our businesses have been secured by the efforts of IT and security practitioners acting on ...
'The Hacker News' Magazine - Relaunching New Editions

'The Hacker News' Magazine - Relaunching New Editions

February 03, 2014Swati Khandelwal
Dear Readers,  After publishing 15 informative editions of ' The Hacker News ' magazine in past 2 years; we at THN are again pla...
DDoS Attacks : A Serious unstoppable menace for IT security communities

DDoS Attacks : A Serious unstoppable menace for IT security communities

October 18, 2013Anonymous
It should be the busiest day of the year for your business, but your website has just disappeared off the Internet and orders have dried...
Importance of Logs and Log Management for IT Security

Importance of Logs and Log Management for IT Security

October 02, 2013Wang Wei
IT Security is the name of the game and no matter how big or small the size of your organization, you will always invest enough on sec...
Snowden files : NSA can crack almost any Encryption including Tor anonymity network

Snowden files : NSA can crack almost any Encryption including Tor anonymity network

September 07, 2013Mohit Kumar
The spy agencies' activities have gone on for more than a decade. Now we have enough details about how the NSA eavesdrops on the in...
EHACK : The Largest Information Security Awareness Marathon Globally

EHACK : The Largest Information Security Awareness Marathon Globally

August 15, 2013Mohit Kumar
More than 9000+ participants enter the Guinness book of World Records for the largest congregation for information Security. E-Hack,...
Google: Gmail Users Should Have No Expectation of Privacy

Google: Gmail Users Should Have No Expectation of Privacy

August 15, 2013Mohit Kumar
Edward Snowden has done enough to highlight how vulnerable electronic communications are to surveillance and Gmail users should not exp...
Microsoft discontinues MD5 crypto for digital certificates to improve RDP Authentication

Microsoft discontinues MD5 crypto for digital certificates to improve RDP Authentication

August 15, 2013Mohit Kumar
This week Microsoft has released several advisories to help their users update from weak crypto. Microsoft is beginning the process of ...
FBI raided Anonymous Hacker house, who exposed Steubenville Rapists

FBI raided Anonymous Hacker house, who exposed Steubenville Rapists

June 08, 2013Mohit Kumar
Another member of the hacker collective Anonymous has been unmasked this week. FBI raided the home of Deric Lostutter in April. Two laptop...
Best Deals

Get Daily News Updates By Email

Join over 500,000 information security professionals — Get the best of our cyber security coverage delivered to your inbox every morning.